Anonymizing overlay network for TCP (The Onion Router)

Edit Package tor
http://tor.eff.org/

Tor is a connection-based low-latency anonymous communication system.

This package provides the "tor" program, which serves as both a client and
a relay node. Scripts will automatically create a "%{toruser}" user and
a "%{torgroup}" group, and set tor up to run as a daemon when the system
is rebooted.

Applications connect to the local Tor proxy using the SOCKS
protocol. The local proxy chooses a path through a set of relays, in
which each relay knows its predecessor and successor, but no
others. Traffic flowing down the circuit is unwrapped by a symmetric
key at each relay, which reveals the downstream relay.

Warnings: Tor does no protocol cleaning. That means there is a danger
that application protocols and associated programs can be induced to
reveal information about the initiator. Tor depends on Privoxy and
similar protocol cleaners to solve this problem. This is alpha code,
and is even more likely than released code to have anonymity-spoiling
bugs. The present network is very small -- this further reduces the
strength of the anonymity provided. Tor is not presently suitable
for high-stakes anonymity.

Authors:
--------
- R. Dingledine

Refresh
Refresh
Source Files
Filename Size Changed
tor-0.2.5.x-logrotate.patch 0000001054 1.03 KB
tor-0.2.6.10-malformed-hostname-safe-logging.patch 0000001183 1.16 KB
tor-0.2.6.10.tar.gz 0003587211 3.42 MB
tor-0.2.6.10.tar.gz.asc 0000000636 636 Bytes
tor.changes 0000120753 118 KB
tor.firewall 0000000725 725 Bytes
tor.keyring 0000195540 191 KB
tor.service 0000000321 321 Bytes
tor.spec 0000006928 6.77 KB
tor.tmpfiles 0000000030 30 Bytes
Latest Revision
Stephan Kulow's avatar Stephan Kulow (coolo) committed (revision 2)
vrev bump
Comments 0
openSUSE Build Service is sponsored by